CN111277608B - Block chain-based security risk information management method, device, equipment and storage medium - Google Patents

Block chain-based security risk information management method, device, equipment and storage medium Download PDF

Info

Publication number
CN111277608B
CN111277608B CN202010097811.3A CN202010097811A CN111277608B CN 111277608 B CN111277608 B CN 111277608B CN 202010097811 A CN202010097811 A CN 202010097811A CN 111277608 B CN111277608 B CN 111277608B
Authority
CN
China
Prior art keywords
user identifier
information
blockchain
node
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010097811.3A
Other languages
Chinese (zh)
Other versions
CN111277608A (en
Inventor
林钊武
罗芳柠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010097811.3A priority Critical patent/CN111277608B/en
Publication of CN111277608A publication Critical patent/CN111277608A/en
Application granted granted Critical
Publication of CN111277608B publication Critical patent/CN111277608B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The embodiment of the application discloses a safety risk information management method, a safety risk information management device, safety risk information management equipment and a safety risk information management medium based on a block chain, and belongs to the technical field of the Internet. The method comprises the following steps: the method comprises the steps that a first node device in a block chain system monitors security risk information sent to a first terminal corresponding to a first user identifier, prompt information is generated, the prompt information is recorded in the block chain, the prompt information is broadcasted to other node devices in the block chain system, a second node device extracts the prompt information from the block chain, a second user identifier bound with the first user identifier is determined, and the prompt information is sent to a second terminal corresponding to the second user identifier. The embodiment of the application provides a safety risk information management method based on a block chain, wherein a plurality of node devices of the block chain system identify whether a first user identifier receives safety risk information, so that the frequency of omitting the safety risk information can be reduced, the identification capability of the safety risk information is enhanced, and the comprehensiveness of safety risk information management is improved.

Description

Block chain-based security risk information management method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of internet, in particular to a safety risk information management method, device, equipment and medium based on a block chain.
Background
With the rapid development of communication technology, terminals are more and more popular in people's daily life, and great convenience is brought to people's life, such as making a call through a terminal, instant chatting and the like. However, users often receive security risk information such as fraud calls or fraud short messages through the terminal, and persons with relatively weak security awareness such as middle-aged and elderly people or teenagers have low recognition capability for the security risk information and are likely to be cheated.
In the related technology, clients with an information security management function are installed in a first terminal and a second terminal, when the client of the second terminal recognizes that the second terminal receives security risk information, a prompt message is sent to the client of the first terminal, and a user of the first terminal can know that the second terminal receives the security risk information according to the prompt message, so that the user of the second terminal is reminded.
However, in the method provided by the related art, only the installed client is used to identify whether the second terminal receives the security risk information, and the security risk information is omitted, so that the identification capability of the security risk information is low, and the prompt of the security risk information is not comprehensive.
Disclosure of Invention
The embodiment of the application provides a safety risk information management method, a safety risk information management device and a safety risk information management medium based on a block chain, and comprehensiveness of safety risk information prompt can be improved. The technical scheme is as follows:
in one aspect, a method for managing security risk information based on a block chain is provided, where the method includes:
responding to security risk information which is sent to a first terminal corresponding to a first user identifier and monitored by first node equipment in a block chain system, and generating prompt information, wherein the prompt information at least comprises the first user identifier;
the first node device records the prompt information in a blockchain, and broadcasts the prompt information to other node devices in the blockchain system, and the blockchain of each node device keeps synchronous;
the second node equipment in the block chain system extracts the prompt information from the block chain;
and the second node equipment determines a second user identifier bound with the first user identifier, and sends the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information.
In another aspect, an apparatus for managing security risk information based on a block chain is provided, the apparatus including:
the system comprises a prompt information generation module, a block chain processing module and a block chain processing module, wherein the prompt information generation module is used for responding to security risk information which is monitored by first node equipment in a block chain system and is sent to a first terminal corresponding to a first user identifier, and the prompt information at least comprises the first user identifier;
a prompt message recording module, configured to record the prompt message in a blockchain, and broadcast the prompt message to other node devices in the blockchain system, where the blockchain of each node device maintains synchronization;
the prompt information extraction module is used for extracting the prompt information from the block chain by second node equipment in the block chain system;
and the prompt information sending module is used for the second node equipment to determine a second user identifier bound with the first user identifier, and send the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information.
In another aspect, a computer device is provided, which includes a processor and a memory, where at least one program code is stored, and the at least one program code is loaded and executed by the processor to implement the operations as performed in the block chain based security risk information management method.
In still another aspect, a computer-readable storage medium having at least one program code stored therein is provided, the at least one program code being loaded and executed by a processor to implement the operations as performed in the block chain based security risk information management method.
In the method, the apparatus, the device, and the medium provided in the embodiment of the present application, the first node device in the blockchain system monitors security risk information sent to the first terminal corresponding to the first user identifier, generates a prompt message, records the prompt message in the blockchain, and broadcasts the prompt message to other node devices in the blockchain system, and the blockchain of each node device keeps synchronous. And the second node equipment in the block chain system extracts the prompt information from the block chain, determines a second user identifier bound by the first user identifier, and sends the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information. The embodiment of the application provides a safety risk information management method based on a block chain, wherein a plurality of node devices in the block chain system are used for identifying whether a first user identifier receives safety risk information, so that the frequency of omitting the safety risk information can be reduced, the identification capability of the safety risk information is enhanced, and the comprehensiveness of safety risk information management is improved.
Moreover, the first user identification is encrypted and uploaded to the block chain, so that the private data of the user can be prevented from being leaked, and the privacy safety of the user is guaranteed.
In addition, the first user identifier and the prompt message are uploaded to the block chain, any node device in the block chain system can acquire the first user identifier, the prompt message and other messages, distributed storage of the messages can be achieved, decentralized storage is achieved, information asymmetry of a plurality of node devices is avoided, and the messages can be effectively prevented from being tampered.
In addition, a blockchain System among various mechanisms is established, an operator can also be accessed into the blockchain System, and the operator can acquire communication information of a terminal operating an android System and communication information of a terminal operating an IOS (Internet operating System), so that the coverage rate of acquiring the communication information is improved, and the management capability of the security risk information is further enhanced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of an implementation environment provided by an embodiment of the present application.
Fig. 2 is a schematic structural diagram of a blockchain system according to an embodiment of the present disclosure.
Fig. 3 is a schematic diagram of a block structure according to an embodiment of the present disclosure.
Fig. 4 is a flowchart of a method for monitoring target registration according to an embodiment of the present application.
Fig. 5 is a schematic diagram of a display interface provided in an embodiment of the present application.
Fig. 6 is a schematic diagram of another display interface provided in an embodiment of the present application.
Fig. 7 is a flowchart of a method for managing security risk information based on a block chain according to an embodiment of the present application.
Fig. 8 is a flowchart of another monitoring target registration method provided in an embodiment of the present application.
Fig. 9 is a flowchart for prompting security risk information according to an embodiment of the present application.
Fig. 10 is a flowchart of another method for prompting security risk information according to an embodiment of the present application.
Fig. 11 is a schematic structural diagram of a security risk information management apparatus based on a block chain according to an embodiment of the present application.
Fig. 12 is a schematic structural diagram of another block chain-based security risk information management apparatus according to an embodiment of the present application.
Fig. 13 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Fig. 14 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application more clear, the embodiments of the present application will be further described in detail with reference to the accompanying drawings.
In order to facilitate understanding of the technical processes of the embodiments of the present application, some terms referred to in the embodiments of the present application are explained below:
block Chain (Block Chain): the method is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. The blockchain is essentially a decentralized database, which is a string of data blocks associated by cryptography, each data block containing information about a network transaction for verifying the validity (anti-counterfeiting) of the information and generating the next block, each block containing a timestamp and a link to the previous block. In a narrow sense, a blockchain is a distributed ledger of data blocks assembled in a sequential manner into a chain data structure in chronological order and cryptographically secured as non-falsifiable and non-forgeable, i.e. the data in the blockchain will be irreversible once recorded.
Alliance Chain (Alliance Chain): refers to a block chain whose consensus process is controlled by preselected block link points. The block chain account book can limit the reading authority only inside the coalition members and can also provide reading capability to the outside. In the alliance chain, all or part of functions are opened only for the members of the block chain link points in the chain, and each block chain link point in the alliance chain can customize read-write permission, query permission and the like based on requirements.
Consensus Mechanism (Consensus Mechanism): the block chain system is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes. In the blockchain system, the verification and confirmation of the transaction can be completed in a short time through the voting of a special node or all nodes. Wherein, if a plurality of nodes with irrelevant benefits can achieve consensus on a transaction, all nodes in the system can be considered to achieve consensus on the transaction.
Smart Contract (Smart Contract): is a computer protocol intended to propagate, validate or execute contracts in an informational manner. Each node in the blockchain system can automatically execute a contract program according to a specific condition, can operate data stored in the chain, and is an important way for a user to interact with the blockchain and realize business logic by using the blockchain. The goal of smart contracts is to provide a secure method over traditional contracts and to reduce other transaction costs associated with the contracts, which allows for trusted transactions that are traceable and irreversible without third parties.
The embodiment of the application provides a safety risk information management method based on a block chain, which can determine a second user identifier bound with a first user identifier and send prompt information to a second terminal corresponding to the second user identifier when monitoring safety risk information sent to the first terminal corresponding to the first user identifier, so that the second user can know that the first user receives the safety risk information, and the first user is reminded.
The method provided by the embodiment of the application can be applied to any scene of managing the safety risk information.
For example, in the scenario of preventing telecommunication fraud, the telecommunication fraud refers to a criminal who creates false information to set a fraud bureau by means of telephone and short message, conducts remote and non-contact fraud on a victim, and induces the criminal to pay money or transfer money for the criminal.
In order to prevent telecommunication fraud, a group with relatively weak security consciousness, such as middle-aged and elderly people or teenagers, is used as a guardian, and the family members of the group are used as protectors. When the fact that the guarded receives the fraud short message or the fraud telephone is identified, prompt information is sent to the guarder so that the guarder helps the guarded to identify the fraud.
Fig. 1 is a schematic diagram of an implementation environment of a method for managing security risk information based on a blockchain according to an embodiment of the present application, and referring to fig. 1, the implementation environment may include a plurality of computer devices 100, where the plurality of computer devices 100 may be node devices in a blockchain system, and the blockchain system may be a federation chain system formed by a plurality of federation members. Any node device in the blockchain system may perform one or more steps of the method for managing security risk information based on blockchains provided by the embodiment of the present application.
The plurality of computer devices 100 may be any type of computing device, such as a server or a terminal, where the server may be a server, a server cluster composed of several servers, or a cloud computing service center. The terminal can be a computer, a smart phone, a tablet computer and the like. This is not particularly limited in the embodiments of the present application.
The plurality of node devices in the blockchain system may be a plurality of node devices belonging to the same organization, or a plurality of node devices belonging to different organizations, for example, the organization may be an internet company, an operator, a mobile phone manufacturer, a judicial department, and the like. Through the plurality of node devices in the block chain system, when the first user identification receives the safety risk information, the prompt information can be sent to the second terminal corresponding to the second user identification.
The first node device in the blockchain system monitors the security risk information sent to the first terminal corresponding to the first user identifier, generates prompt information, records the prompt information in the blockchain, broadcasts the prompt information to other node devices in the blockchain system, and the blockchain of each node device keeps synchronous. And when the second node equipment in the block chain system extracts the prompt information from the block chain, determining a second user identifier bound by the first user identifier, and sending the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information.
The first node device and the second node device may be any node devices in the blockchain system, and the first node device and the second node device may be the same device or different devices.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a blockchain system 200 according to an embodiment of the present application, where the blockchain system 200 may be a federation chain system formed by a plurality of federation members. The blockchain system 200 includes a plurality of node apparatuses 201 and a terminal 202, and the node apparatuses 201 are connected to the terminal 202.
A point-To-point (P2P, Peer To Peer) network is formed between the node devices 201, and the P2P Protocol is an application layer Protocol operating on a Transmission Control Protocol (TCP). In the blockchain system 200, any computing device, such as a server, a terminal, etc., may be added to become a node device 201.
Referring to fig. 2, the functions of each node device 201 in the blockchain system 200 are shown, and the functions involved include:
1) routing, a basic function that node device 201 has for supporting communication between node devices 201.
The node apparatus 201 may have the following functions in addition to the routing function:
2) the application is configured to be deployed in a blockchain, implement a specific service according to an actual service requirement, record data related to an implementation function to form record data, carry a digital signature in the record data to indicate a source of task data, and send the record data to other node devices 201 in the blockchain system 200, so that the other node devices 201 add the record data to a temporary block when the source and integrity of the record data are verified successfully.
For example, the services implemented by the application include:
2.1) sharing the account book, configured to provide functions of operations such as storage, query, and modification of the account data, send the record data of the operation on the account data to other node devices 201 in the blockchain system 200, and after the other node devices 201 verify that the record data is valid, store the record data in a temporary block as a response for acknowledging that the account data is valid, and may also send an acknowledgement to the node device 201 initiating the operation.
And 2.2) managing the safety risk information, determining the user identification bound by the user identification when monitoring the safety risk information sent to the user identification, and sending prompt information to a terminal corresponding to the user identification bound by the user identification.
Referring to fig. 3, fig. 3 is an optional schematic diagram of a Block Structure (Block Structure) provided in this embodiment, where fig. 3 includes a Block 301, a Block 302, and a Block 303, the Block 301 is a Block before the Block 302, the Block 302 is a Block before the Block 303, each Block includes a hash value of a transaction record (hash value of the Block) stored in the Block and a hash value of a previous Block, and the blocks are connected by the hash values to form a Block chain. The block may include information such as a time stamp at the time of block generation.
Fig. 4 is a flowchart of a method for monitoring target registration provided in an embodiment of the present application, where interaction subjects of the method are a first terminal, a second node device in a blockchain system, and a second terminal, and referring to fig. 4, the method includes:
401. and the second terminal sends a monitoring target registration request to second node equipment in the block chain system.
The first user possesses a first terminal for logging in the first user identification, and the second user possesses a second terminal for logging in the second user identification. The first terminal and the second terminal are respectively in communication connection with second node equipment in the block chain system, and the second node equipment provides services for the first terminal and the second terminal. And when the second user needs to monitor the security risk information received by the first user, sending a monitoring target registration request to the second node equipment through the second terminal.
The second node device is any node device in the blockchain system. The second node device can establish communication connection with the terminal to provide service for the terminal, such as realizing functions of registering and monitoring target user identifiers, establishing binding relations among the user identifiers, sending messages to the terminal, and the like. Optionally, the second node device is an instant messaging server of an instant messaging client, the first user may log in the instant messaging server through the instant messaging client based on the first user identifier, the second user may log in the instant messaging server through the instant messaging client based on the second user identifier, and the instant messaging server may establish a binding relationship between the first user identifier and the second user identifier.
In one possible implementation manner, the monitoring target registration request carries a first user identifier that requests to be registered as the monitoring target user identifier, and a second user identifier that requests to be bound with the first user identifier. The monitoring target registration request is used for indicating the second node equipment to establish a binding relationship between the first user identification and the second user identification, and registering the first user identification as the monitoring target user identification.
The first user identification is used for representing the identity of the first user, and the second user identification is used for representing the identity of the second user. The user identifier may be a user account, a telephone number, a user nickname, an email, or the like. The monitoring target user identifier represents a user identifier to be monitored in the block chain system, and when the first user identifier is registered as the monitoring target user identifier, the block chain system monitors the first user identifier so as to manage the security risk information received by the first user identifier.
The binding relationship refers to binding between a first user identifier and a second user identifier, wherein the first user identifier is a user identifier to be monitored, the second user identifier is a user identifier to be prompted, and the binding relationship represents that: and monitoring whether the first user identification receives the safety risk information, and prompting the second user identification when the first user identification receives the safety risk information.
In another possible implementation manner, the second node device provides a binding entry for the second terminal, and the second terminal sends a monitoring target registration request to the second node device through the binding entry. The binding entry may be a client installed on the terminal, an applet in the client, a website in a browser, or a public number of a service class.
In another possible implementation manner, the second terminal displays a monitoring target registration interface, and the monitoring target registration interface comprises a registration button. And the second terminal displays at least one user identifier associated with the second user identifier when detecting the triggering operation of the registration button based on the monitoring target registration interface, generates a monitoring target registration request comprising the first user identifier and the second user identifier when detecting the triggering operation of the first user identifier in the at least one user identifier, and sends the monitoring target registration request to the second node equipment.
The monitoring target registration interface can be an interface provided by a public number, and the public number has the functions of binding the user identifier, managing the safety risk information received by the user identifier and the like. For example, as shown in fig. 5, a public security department works together with an application client to create a public number 51 that can provide anti-fraud services, and a user concerning the public number 51 can establish a binding relationship between user identifications through the public number 51.
As shown in fig. 6, the second terminal displays a public number interface 61, the public number in the public number interface 61 has a function of managing security risk information, and a "friend-cheat-prevention" button 611 is included in the public number interface 61. When the clicking operation of the button 611 by the second user is detected, a function introduction interface 62 is displayed, and a "bind friends" button 621 is included in the function introduction interface 62. When the clicking operation of the second user on the button 621 is detected, a buddy list interface 63 of a second user identifier currently logged in by the second terminal is displayed, where the buddy list interface 63 includes a plurality of user identifiers associated with the second user identifier. When the click operation of a second user on the user identifier 1 is detected, the user identifier 1 is used as a first user identifier to be bound, and the second terminal sends a monitoring target registration request carrying the first user identifier and the second user identifier to second node equipment according to the click operation.
402. And when receiving the monitoring target registration request sent by the second terminal, the second node equipment sends the monitoring target registration request to the first terminal corresponding to the first user identification.
When receiving a monitoring target registration request sent by a second terminal, a second node device determines that a request carried in the monitoring target registration request is registered as a first user identifier of a monitoring target user identifier, and sends the monitoring target registration request to a first terminal corresponding to the first user identifier.
In a possible implementation manner, the second node device generates a registration link corresponding to the monitoring target registration request according to the monitoring target registration request sent by the second terminal, sends the registration link to the first terminal based on the second user identifier, and receives the registration link by the first terminal based on the first user identifier.
403. And when receiving the monitoring target registration request sent by the second node equipment, the first terminal sends a registration confirmation message to the second node equipment.
When receiving the monitoring target registration request, the first terminal may send a binding acknowledgement message to the second node device, where the binding acknowledgement message is used to indicate that the monitoring target registration request of the second user identifier is accepted.
In one possible implementation manner, the first terminal displays a monitoring target registration interface, and the monitoring target registration interface comprises a registration prompt message and a confirmation button. And when the first terminal detects the trigger operation of the confirmation button based on the monitoring target registration interface, sending a registration confirmation message to the second node equipment.
The registration prompt message is used for prompting that the first user identifier is registered as a monitoring target user identifier, and the confirmation button is used for confirming establishment of a binding relationship between the first user identifier and the second user identifier and registering the first user identifier as the monitoring target user identifier.
Optionally, the monitoring target registration interface further includes a reject button, where the reject button is configured to reject establishment of a binding relationship between the first user identifier and the second user identifier, that is, reject registration of the first user identifier as the monitoring target user identifier.
In another possible implementation manner, the first terminal receives a registration link corresponding to the monitoring target registration request sent by the second node device based on the first user identifier, and when the second node device detects a trigger operation on the registration link, the first terminal displays a monitoring target registration interface.
For example, when the first terminal receives the registration link sent by the second user identifier based on the first user identifier, the interactive interface 64 of the first user identifier and the second user identifier is displayed, as shown in fig. 5, the registration link sent by the second user identifier is included in the interactive interface 64. When the clicking operation of the first user on the registration link is detected, the monitoring target registration interface 65 is displayed, and the confirmation button 651, the rejection button 652 and the registration prompt message are included in the monitoring target registration interface 65. When the clicking operation of the first user on the confirmation button 651 is detected, the first terminal sends a registration confirmation message to the second node device.
It should be noted that, in the embodiment of the present application, only the first terminal receives the monitoring target registration request of the second terminal and sends the registration confirmation message to the second node device is taken as an example for description. In another embodiment, the first terminal may further reject the monitoring target registration request of the second terminal, and send a registration rejection message to the second node device, where the registration rejection message is used to indicate that the monitoring target registration request of the second user identifier is rejected.
It should be noted that, in the embodiment of the present application, only the second node device sends the registration link to the first terminal as an example for description. In another embodiment, the second node device generates a registration link corresponding to the monitoring target registration request according to the received monitoring target registration request, sends the registration link to the second terminal, and sends the registration link to the first terminal by the second terminal. For example, when the second terminal receives the registration link, the registration link may be sent to the first terminal in a form of a social account or a short message.
404. When receiving a registration confirmation message sent by a first terminal, a second node device establishes a binding relationship between a first user identifier and a second user identifier, registers the first user identifier in a blockchain, and broadcasts the first user identifier to other node devices in the blockchain system.
And the second node equipment receives the registration confirmation message sent by the first terminal, establishes the binding relationship between the first user identification and the second user identification, registers the first user identification as a monitoring target user identification in the block chain, broadcasts the first user identification to other node equipment in the block chain system, and keeps the block chain of each node equipment synchronous. The first user identification receiving the monitoring target registration request is the user identification to be monitored, and the second user identification sending the monitoring target registration request is the user identification to be prompted.
In one possible implementation, the second node device generates a second block including the first user identifier, broadcasts the second block to other node devices in the blockchain system, so that the plurality of node devices in the blockchain system perform consensus verification on the second block, and records the second block in the blockchain when the second block passes the consensus of the plurality of node devices in the blockchain system.
Optionally, the process of generating the second block by the second node device may include: the last block in the block chain is called as a previous block, the second node device can acquire the information of the previous block from the block chain, so that a block head characteristic value of the previous block can be generated based on the information of the previous block, characteristic value calculation is performed on information such as a first user identifier and the like which needs to be stored in the second block, a block main body characteristic value of the second block is obtained, and further, the second node device can store the block head characteristic value of the previous block and the block main body characteristic value of the second block to a block head of the second block, and store the information such as the first user identifier and the like to a block main body of the second block, so that the second block is generated. Therefore, the previous block and the second block are related by the block head characteristic value of the previous block, so that the aim of connecting blocks in series in a block chain can be fulfilled, and the next block can be used for verifying whether the previous block is correct or not. It should be noted that the above description of the block generation process is only an exemplary description of one block generation method, and the embodiment of the present application does not limit which block generation method is specifically adopted.
And after the second node equipment generates the second block, verifying the second block through a consensus mechanism. The blockchain system can identify the second block to determine whether the information in the second block is accurate, i.e., verify the information in the second block. In a possible implementation manner, after the second node device generates the second block, the second block may be broadcast to other node devices, and the other node devices may verify the second block and broadcast the verification result in the block chain system, respectively. The target ratio may be set by a block chain system, which is not limited in the embodiment of the present application. The consensus process can be implemented based on a consensus mechanism, for example, the consensus mechanism can be a workload proving mechanism, a rights and interests proving mechanism, a shares authorization proving mechanism, and the like. It should be noted that the above-mentioned consensus process is only an exemplary description, and the embodiments of the present application do not limit this.
It should be noted that, in this embodiment, only one first user identifier is taken as an example for description, in another embodiment, the second node device may obtain a plurality of first user identifiers that are requested to be registered as monitoring target user identifiers, package the plurality of first user identifiers obtained within a period of time, generate a second block, perform consensus on the second block by the blockchain system, and after the second block passes the consensus, synchronize the plurality of first user identifiers in the second block to any node device in the blockchain system.
In another possible implementation manner, the second node device encrypts the first user identifier by using a preset encryption algorithm, and broadcasts the encrypted first user identifier to other node devices in the blockchain system, so that the other node devices register the encrypted first user identifier in a corresponding blockchain, and the blockchain of each node device keeps synchronous.
Since each node device in the block chain system can acquire the first user identifier stored in the block chain, and the first user identifier is the privacy data of the first user such as the name, the telephone number, the e-mail box, the identification number and the like, in order to ensure the privacy safety of the first user, the second node device uploads the encrypted first user identifier to the block chain, and the privacy data of the user are prevented from being leaked.
The preset Encryption Algorithm may be DES (Data Encryption Algorithm), AES (Advanced Encryption Standard), and the like, and the embodiment of the present application is not particularly limited.
It should be noted that, in the embodiment of the present application, only the first terminal sends the registration confirmation message to the second node device as an example for description. In yet another embodiment, the first terminal may further send a registration rejection message to the second node device. And if the second node equipment receives the registration rejection message sent by the first terminal, the binding relationship between the first user identification and the second user identification is not established, and the first user identification is not registered in the block chain. Optionally, when the second node device receives the registration rejection message sent by the first terminal, the registration rejection message is sent to the second terminal.
405. And the second node equipment sends a registration success message to the second terminal.
406. And when the second terminal receives the registration success message sent by the second node equipment, outputting the registration success message.
And when the second terminal receives the registration success message sent by the second node equipment, outputting the registration success message to remind the second user of successful registration. For example, as shown in fig. 6, the second terminal displays a public interface 66, and a registration success message is displayed in the public interface 66. The registration success message includes the registered user identifier, the registration time, and the like.
It should be noted that, in this embodiment, it is described by taking an example that the monitoring target registration request carries the first user identifier and the second user identifier, but in another embodiment, the monitoring target registration request only includes the first user identifier, and the second node device only needs to register the first user identifier as the monitoring target user identifier.
It should be noted that, in the embodiment of the present application, it is described that the user identifier to be prompted actively sends the monitoring target registration request, and the user identifier to be monitored receives the monitoring target registration request. In another embodiment, a monitoring target registration request may also be actively sent by a user identifier to be monitored, and the user identifier to be prompted receives the monitoring target registration request, which includes the specific steps of: and the second node equipment receives a monitoring target registration request sent by a first terminal corresponding to the first user identification and sends the monitoring target registration request to a second terminal corresponding to the second user identification. When the second node device receives the registration confirmation message sent by the second terminal, the binding relationship between the first user identifier and the second user identifier is established, the first user identifier sending the monitoring target registration request is registered as the monitoring target user identifier, namely the user identifier to be monitored, and the second user identifier receiving the monitoring target registration request is used as the user identifier to be prompted. In this case, the monitoring target registration request carries a first user identifier requesting registration as the monitoring target user identifier and a second user identifier requesting binding with the first user identifier. The process is similar to the above-mentioned step 401-406 and will not be described again.
Fig. 7 is a flowchart of a method for managing security risk information based on a block chain according to an embodiment of the present application. The method is applied to the implementation environment shown in fig. 1, and referring to fig. 7, the method comprises the following steps:
701. and the second terminal sends a monitoring target registration request to second node equipment in the block chain system.
702. And when receiving the monitoring target registration request sent by the second terminal, the second node equipment sends the monitoring target registration request to the first terminal corresponding to the first user identification.
703. And when receiving the monitoring target registration request sent by the second node equipment, the first terminal sends a registration confirmation message to the second node equipment.
704. When receiving a registration confirmation message sent by a first terminal, a second node device establishes a binding relationship between a first user identifier and a second user identifier, registers the first user identifier in a blockchain, and broadcasts the first user identifier to other node devices in the blockchain system.
The blockchain system stores an intelligent contract for managing security risk information, and the intelligent contract is a contract program automatically executed according to specific conditions. When the second node device registers the first user identifier as a monitoring target user identifier in the blockchain system, triggering an intelligent contract in the blockchain system, and executing subsequent operation by the node device in the blockchain system according to the intelligent contract.
The specific process of the second node device registering the first user identifier as the monitoring target user identifier in step 701 and 704 is similar to that in step 401 and 404, and is not described herein again.
Fig. 8 is a flowchart of a method for monitoring target registration according to an embodiment of the present application, and with reference to fig. 8, the steps are as follows:
1. and the second terminal corresponding to the second user identification initiates a monitoring target registration request.
2. And judging whether the first terminal of the first user identification accepts or not. If the first terminal accepts the registration, the next step is executed; if the first terminal does not accept the registration, the registration fails and the process ends.
3. And registering the first user identifier as a monitoring target user identifier, finishing the registration and ending the process.
705. And the first node equipment in the block chain system collects communication information and identifies the safety risk information of the communication information.
The first node device is a node device in a block chain system, and has a function of collecting communication information, wherein the communication information can be a telephone or a short message, and the first node device is a server of an operator, a server of a mobile phone manufacturer, or a server associated with an application client having an authority of inquiring a call record or a short message record, and the like.
The first node device may acquire communication information between the terminals in real time or periodically, identify the acquired communication information, and acquire a receiver user identifier of the security risk information if the communication information is identified as the security risk information. The safety risk information refers to information which may cause harm to users, such as fraud calls, fraud short messages, marketing calls and the like. In the embodiment of the application, the user identifier of the receiver of the communication information acquired by the first node device is the first user identifier.
In a possible implementation manner, the first node device obtains a sender user identifier of the communication information, and if the security risk identifier library includes the sender user identifier, identifies that the communication information is the security risk information.
When the first node equipment acquires the communication information, the sender user identification corresponding to the communication information is acquired, a safety risk identification library stored in the first node equipment is inquired, and whether the sender user identification is included in the safety risk identification library or not is judged. If the safety risk identification library comprises the sender user identification, the sender user identification belongs to the safety risk identification, and the communication information is determined to be safety risk information; and if the safety risk identification library does not comprise the sender user identification, the sender user identification does not belong to the safety risk identification, and the first node equipment does not need to process the communication information if the communication information is determined not to be the safety risk information.
The safety risk identification library is used for storing user identifications for sending safety risk information. Optionally, the user receives the communication information through the terminal, when the user considers that the communication information is the security risk information, the user identifier of the sender of the communication information may be marked, when the first node device detects a marking operation performed by the user, the user identifier corresponding to the marking operation is determined, and the user identifier is added to the security risk identifier library, or when the number of times that the user identifier is marked is greater than a preset value, the user identifier is added to the security risk identifier library. Optionally, the first node device may construct the security risk identification library in a machine learning manner.
In another possible implementation manner, when the first node device acquires the communication information, it is identified whether the communication information includes the security risk keyword. And if the communication information comprises the security risk key words, determining that the communication information is the security risk information.
For example, the first node device may construct a security risk keyword library in a machine learning or manual tagging manner, where the security risk keyword library is used to store words belonging to security risk keywords. And when the first node equipment acquires the communication information, matching the communication information with the safety risk keyword library, and judging whether the communication information comprises words in the safety risk keyword library. And if the communication information comprises words in the safety risk keyword library, the communication information comprises safety risk keywords, and the communication information is determined to be safety risk information.
For another example, the first node device performs semantic analysis on the communication information through artificial intelligence to identify whether the text information or the voice information of the communication information includes security risk keywords.
706. And if the first node equipment identifies that the communication information is the safety risk information, matching the first user identification with the monitoring target user identification registered in the block chain, and generating prompt information in response to determining that the first user identification belongs to the monitoring target user identification.
When the first node device obtains the first user identifier of the security risk information, one or more monitoring target user identifiers registered in the block chain are inquired, and whether the one or more monitoring target user identifiers comprise the user identifier which is the same as the first user identifier or not is judged. When the first node equipment determines that the first user identification is the same as a registered monitoring target user identification, determining that the first user identification belongs to the monitoring target user identification, and generating prompt information at least comprising the first user identification; when the first node device determines that the first user identifier is different from any user identifier in the one or more monitoring target user identifiers, the first user identifier is determined not to belong to the monitoring target user identifier, and the security risk information is ignored and is not processed.
Wherein the prompt message is used to indicate that the first subscriber identity receives the security risk information.
In a possible implementation manner, when determining that the first user identifier belongs to the monitoring target user identifier, the first node device obtains a sender user identifier corresponding to the communication information, generates a prompt message including the sender user identifier and the first user identifier, and subsequently uploads the prompt message to the block chain, where the prompt message is used to indicate that the first user identifier receives security risk information sent by the sender user identifier.
In a possible implementation manner, the first user identifier encrypted by using a preset encryption algorithm is stored in the blockchain. Therefore, when the first node device monitors the safety risk information, the preset encryption algorithm is adopted to encrypt the receiver user identification of the safety risk information, and if the encrypted receiver user identification is the same as the encrypted first user identification, prompt information is generated.
Because the preset encryption algorithm adopted when the second node device encrypts the first user identifier is the same as the preset encryption algorithm adopted when the first node device encrypts the receiver user identifier of the security risk information, if the encrypted receiver user identifier is the same as the encrypted first user identifier, it can be determined that the receiver user identifier before encryption is the same as the first user identifier before encryption. Therefore, when the encrypted receiver user identifier is the same as the encrypted first user identifier, it may be determined that the receiver user identifier is the monitoring target user identifier, and then prompt information including the first user identifier is generated.
It should be noted that, in the above step 705-706, the security risk information sent to the first terminal corresponding to the first user identifier is monitored by the first node device in the blockchain system through identifying the communication information and matching the first user identifier with the monitoring target user identifier, so as to generate the prompt information. In yet another embodiment, other ways may be used to monitor whether the first subscriber identity receives the security risk information.
707. The first node device records the prompt information in the blockchain and broadcasts the prompt information to other node devices in the blockchain system.
When the first node device generates the prompt message, the prompt message is recorded in the blockchain, and the prompt message is broadcasted to other node devices in the blockchain system, and the blockchain of each node device keeps synchronous.
In one possible implementation manner, the first node device generates a first block including the hint information, broadcasts the first block to other node devices in the blockchain system, so that the plurality of node devices in the blockchain system perform consensus verification on the first block, and records the first block in the blockchain after the first block passes the consensus of the plurality of node devices in the blockchain system.
The process of generating the first block is similar to the process of generating the second block in step 404, and is not described herein again.
Optionally, the second node device may package a plurality of pieces of hint information obtained within a period of time, generate a first block, and perform consensus on the first block by the block chain system, where after the first block passes the consensus, the plurality of pieces of hint information in the first block may be synchronized to any node device in the block chain system.
708. And the second node equipment extracts the prompt information from the block chain and determines a second user identifier bound by the first user identifier.
When the second node device extracts the prompt message, it is determined that the first user identifier in the prompt message receives the security risk information, the second node device queries the established binding relationship, and determines a second user identifier bound with the first user identifier, where the second user identifier is a user identifier to be prompted.
In a possible implementation manner, the second node device queries whether the established binding relationship includes a user identifier that is the same as the first user identifier, and determines, according to the binding relationship, the second user identifier bound by the first user identifier if the binding relationship includes the user identifier that is the same as the first user identifier.
The second node equipment inquires at least one established binding relationship, each binding relationship comprises a user identifier to be monitored and a user identifier to be prompted, and the second node equipment inquires whether the at least one binding relationship comprises the user identifier which is the same as the first user identifier. And if the binding relationship comprises the user identifier which is the same as the first user identifier, the second node equipment establishes the binding relationship between the first user identifier and other user identifiers, and the second node equipment determines the second user identifier bound by the first user identifier according to the binding relationship.
Optionally, if the binding relationship does not include the user identifier that is the same as the first user identifier, which indicates that the second node device does not establish the binding relationship between the first user identifier and the other user identifiers, the second node device ignores the prompt message.
709. And the second node equipment sends prompt information to a second terminal corresponding to the second user identification.
And when the second node equipment acquires the second user identification to be prompted, determining a second terminal corresponding to the second user identification, and sending prompt information to the second terminal. The prompt message is used for prompting the first user identifier to receive the safety risk message. Optionally, the prompt message further includes a sender user identifier, and the prompt message is used to prompt that the first user identifier receives the security risk information sent by the sender user identifier.
Fig. 9 is a flowchart of a method for prompting security risk information according to an embodiment of the present application, and with reference to fig. 9, the steps are as follows:
1. any node device in the alliance chain system collects communication information, and when a fraud call incoming call is monitored, the next step is executed.
2. The node equipment of the fraudulent call is monitored and whether the called number is on the block chain of the alliance chain system is inquired. If the block is on the blockchain, executing the next step; if not, the flow ends.
3. According to the intelligent contract, each node device in the alliance chain system is informed that the called number receives a fraud call.
4. Each node device respectively judges whether the binding relationship includes the called number. If the binding relationship established by the node equipment comprises the called number, the node equipment executes the next step; and if the binding relationship established by the node equipment does not comprise the called number, the node equipment ends the process.
5. And the node equipment sends a prompt message to the terminal bound with the called number, and the process is ended.
710. And the second terminal outputs the prompt message when receiving the prompt message.
The prompt message may include a text prompt message or a voice prompt message. When the second terminal receives the text prompt message, displaying the text prompt message in an interface of the second terminal; and when the second terminal receives the voice prompt message, playing the voice prompt message in the second terminal.
Optionally, the prompt message may include the first user identifier, a sender user identifier of the security risk information, a receiving time of the security risk information, and the like.
For example, as shown in fig. 6, when the second terminal receives the prompt message, the prompt message is displayed in the public interface 67 of the second terminal, and the prompt message includes the binding object "user identifier 1", the telephone number of the security risk information sender, and the receiving time of the security risk information.
By executing the step 701 and 711, three processes of registering and monitoring the target user identifier, identifying the security risk information and prompting the security risk information can be realized. As shown in fig. 10, a user 101 is a user to be prompted, a user 102 is a user to be monitored, the users 101 and 102 register through a registration entry provided by a second node device, the second node device triggers an intelligent contract to encrypt a user identifier of the user 102 and uplink the encrypted user identifier, when a first node device in a block chain system finds security risk information, it is queried whether a user identifier of a receiver of the security risk information is the same as a first user identifier of the user 102, and when the first node device in the block chain system finds the security risk information, the first node device notifies the block chain system, and a second node device in the block chain system notifies the user 101 that the user 102 receives the security risk information.
It should be noted that, in this embodiment of the application, the first user identifier is a user identifier to be monitored, the second user identifier is a user identifier to be prompted, and when it is monitored that the first user identifier receives the security risk information, the second user identifier is prompted that the first user identifier receives the security risk information. In the embodiment of the application, only the first user identifier and the second user identifier belong to different user identifiers as an example for explanation, and the second user corresponding to the second user identifier knows that the first user identifier receives the security risk information according to the prompt information, so that the first user corresponding to the first user identifier can be reminded. In another embodiment, the first user identifier and the second user identifier may also be the same user identifier, and the user identifier receives the security risk information, that is, the user identifier can know that the user receives the security risk information according to the prompt information, thereby improving vigilance.
It should be noted that, the blockchain system in the embodiment of the present application has a security risk information management capability, a first node device in the blockchain system has a node device capable of monitoring security risk information, a second node device in the blockchain system is a node device having a capability of registering and monitoring a target user identifier, and the second node device and the first node device may be the same node device or different node devices.
It should be noted that, in the embodiment of the present application, only the first node device in the blockchain system is taken as an example to describe a process of monitoring the security risk information. In fact, the node devices in the block chain may all perform the step 705-707, that is, the node devices in the block chain system collect the communication information to identify whether the communication information is the security risk information.
In the method provided by the embodiment of the present application, a first node device in a blockchain system monitors security risk information sent to a first terminal corresponding to a first user identifier, generates a prompt message, records the prompt message in the blockchain, and broadcasts the prompt message to other node devices in the blockchain system, where the blockchain of each node device maintains synchronization. And the second node equipment in the block chain system extracts the prompt information from the block chain, determines a second user identifier bound by the first user identifier, and sends the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information. The embodiment of the application provides a safety risk information management method based on a block chain, wherein a plurality of node devices in the block chain system are used for identifying whether a first user identifier receives safety risk information, so that the frequency of omitting the safety risk information can be reduced, the identification capability of the safety risk information is enhanced, and the comprehensiveness of safety risk information management is improved.
Moreover, the first user identification is encrypted and uploaded to the block chain, so that the private data of the user can be prevented from being leaked, and the privacy safety of the user is guaranteed.
In addition, the first user identifier and the prompt message are uploaded to the block chain, any node device in the block chain system can acquire the first user identifier, the prompt message and other messages, distributed storage of the messages can be achieved, decentralized storage is achieved, information asymmetry of a plurality of node devices is avoided, and the messages can be effectively prevented from being tampered.
In addition, a blockchain System among various mechanisms is established, an operator can also be accessed into the blockchain System, and the operator can acquire communication information of a terminal operating an android System and communication information of a terminal operating an IOS (Internet operating System), so that the coverage rate of acquiring the communication information is improved, and the management capability of the security risk information is further enhanced.
Fig. 11 is a schematic structural diagram of a block chain-based security risk information management apparatus according to an embodiment of the present application, and referring to fig. 11, the apparatus includes:
a prompt information generating module 1101, configured to generate a prompt information in response to a first node device in the blockchain system monitoring security risk information sent to a first terminal corresponding to a first user identifier, where the prompt information at least includes the first user identifier;
a prompt information recording module 1102, configured to record, by a first node device, a prompt information in a blockchain, and broadcast the prompt information to other node devices in a blockchain system, where the blockchain of each node device keeps synchronous;
a hint information extraction module 1103, configured to extract hint information from the blockchain by a second node device in the blockchain system;
and a prompt information sending module 1104, configured to determine, by the second node device, a second user identifier bound to the first user identifier, and send a prompt information to a second terminal corresponding to the second user identifier, so that the second terminal outputs the prompt information.
In the device for managing security risk information based on a blockchain provided in the embodiment of the present application, a first node device in a blockchain system monitors security risk information sent to a first terminal corresponding to a first user identifier, generates a prompt message, records the prompt message in the blockchain, and broadcasts the prompt message to other node devices in the blockchain system, where the blockchain of each node device maintains synchronization. And the second node equipment in the block chain system extracts the prompt information from the block chain, determines a second user identifier bound by the first user identifier, and sends the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information. The embodiment of the application provides a safety risk information management method based on a block chain, wherein a plurality of node devices in the block chain system are used for identifying whether a first user identifier receives safety risk information, so that the frequency of omitting the safety risk information can be reduced, the identification capability of the safety risk information is enhanced, and the comprehensiveness of safety risk information management is improved.
Optionally, referring to fig. 12, the prompt information generating module 1101 includes:
the information identification unit 1111 is configured to collect communication information by the first node device, and perform security risk information identification on the communication information, where a user identifier of a receiver of the communication information is a first user identifier;
the information processing unit 1121 is configured to, if the communication information is identified as the security risk information, perform matching processing on the first user identifier and a monitoring target user identifier registered in the blockchain;
a first generating unit 1131, configured to generate a prompt message in response to determining that the first user identifier belongs to the monitoring target user identifier.
Optionally, referring to fig. 12, the information identifying unit 1111 is further configured to: acquiring a sender user identifier of communication information;
and if the safety risk identification library comprises the sender user identification, identifying that the communication information is the safety risk information, wherein the safety risk identification library is used for storing the user identification for sending the safety risk information.
Optionally, referring to fig. 12, the prompt information recording module 1102 includes:
a first block generation unit 1112, configured to generate, by the first node device, a first block including the hint information;
a first tile broadcasting unit 1122, configured to broadcast the first tile to other node devices in the blockchain system, so that the plurality of node devices in the blockchain system perform consensus verification on the first tile;
the first block registration unit 1132 is configured to record the first block in the blockchain after the first block passes through the consensus of the plurality of node devices in the blockchain system.
Optionally, referring to fig. 12, the apparatus further comprises:
a request receiving module 1105, configured to receive, by the second node device, a monitoring target registration request, where the monitoring target registration request carries a first user identifier that is requested to be registered as a monitoring target user identifier;
a registering module 1106, configured to register the first ue in the blockchain and broadcast the first ue to other node devices in the blockchain system, where the blockchain of each node device maintains synchronization.
Optionally, referring to fig. 12, the registration module 1106 includes:
a second block generation unit 1116, configured to generate, by the second node device, a second block including the first subscriber identity;
a second block broadcasting unit 1126, configured to broadcast the second block to other node devices in the blockchain system, so that multiple node devices in the blockchain system perform consensus verification on the second block;
a second block registering unit 1136, configured to record the second block in the blockchain after the second block passes through the consensus of the plurality of node devices in the blockchain system.
Optionally, referring to fig. 12, the registration module 1106 includes:
a first encrypting unit 1146, configured to encrypt the first user identifier by using a preset encryption algorithm by the second node device;
a first identifier registering unit 1156, configured to register the encrypted first user identifier in the blockchain, and broadcast the encrypted first user identifier to other node devices in the blockchain system, where the blockchain of each node device maintains synchronization.
Optionally, referring to fig. 12, the prompt information generating module 1101 includes:
a second encryption unit 1141, configured to encrypt, in response to the first node device monitoring the security risk information, a recipient user identifier of the security risk information by using a preset encryption algorithm;
a second generating unit 1151, configured to generate a prompt message if the encrypted recipient user identifier is the same as the encrypted first user identifier.
Optionally, referring to fig. 12, the monitoring target registration request further carries a second subscriber identity requesting to be bound to the first subscriber identity, and the registration module 1106 includes:
a request sending unit 1166, configured to send a monitoring target registration request to the first terminal corresponding to the first user identifier by the second node device;
a relation establishing unit 1176 for establishing a binding relation between the first subscriber identity and the second subscriber identity in response to receiving the binding acknowledgement message sent by the first terminal
A second identifier registering unit 1186, configured to register the first user identifier in the blockchain.
It should be noted that: in the above embodiment, when managing security risk information, the security risk information management apparatus based on a block chain is exemplified by only the division of the functional modules, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of each node device in the block chain system is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the block chain-based security risk information management apparatus provided in the above embodiment and the block chain-based security risk information management method embodiment belong to the same concept, and specific implementation processes thereof are described in the method embodiment and are not described herein again.
Fig. 13 shows a schematic structural diagram of a terminal 1300 according to an exemplary embodiment of the present application, where the terminal 1300 may be configured to perform operations performed by the first terminal or the second terminal in the foregoing method embodiments.
In general, terminal 1300 includes: a processor 1301 and a memory 1302.
Processor 1301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 1301 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1301 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also referred to as a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1301 may be integrated with a GPU (Graphics Processing Unit, image Processing interactor) for rendering and drawing content required to be displayed on the display screen. In some embodiments, processor 1301 may further include an AI (Artificial Intelligence) processor for processing computational operations related to machine learning.
Memory 1302 may include one or more computer-readable storage media, which may be non-transitory. The memory 1302 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 1302 is used to store at least one program code for the processor 1301 to implement the blockchain based security risk information management method provided by the method embodiments of the present application.
In some embodiments, the apparatus 1300 may further optionally include: a peripheral interface 1303 and at least one peripheral. Processor 1301, memory 1302, and peripheral interface 1303 may be connected by a bus or signal line. Each peripheral device may be connected to the peripheral device interface 1303 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1304, touch display 1305, camera 1306, audio circuitry 1307, positioning component 1308, and power supply 1309.
Peripheral interface 1303 may be used to connect at least one peripheral associated with I/O (Input/Output) to processor 1301 and memory 1302. In some embodiments, processor 1301, memory 1302, and peripheral interface 1303 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1301, the memory 1302, and the peripheral device interface 1303 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 1304 is used to receive and transmit RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 1304 communicates with communication networks and other communication devices via electromagnetic signals. The radio frequency circuit 1304 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1304 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 1304 may communicate with other devices via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: metropolitan area networks, various generation mobile communication networks (2G, 3G, 4G, and 8G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 1304 may also include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 1305 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 1305 is a touch display screen, the display screen 1305 also has the ability to capture touch signals on or over the surface of the display screen 1305. The touch signal may be input to the processor 1301 as a control signal for processing. At this point, the display 1305 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, display 1305 may be one, providing the front panel of terminal 1300; in other embodiments, display 1305 may be at least two, either on different surfaces of terminal 1300 or in a folded design; in some embodiments, display 1305 may be a flexible display disposed on a curved surface or on a folded surface of terminal 1300. Even further, the display 1305 may be arranged in a non-rectangular irregular figure, i.e., a shaped screen. The Display 1305 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or the like.
The camera assembly 1306 is used to capture images or video. Optionally, camera assembly 1306 includes a front camera and a rear camera. Typically, the front camera is disposed on the front panel of the terminal 1300 and the rear camera is disposed on the rear side of the terminal 1300. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 1306 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuit 1307 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 1301 for processing, or inputting the electric signals to the radio frequency circuit 1304 for realizing voice communication. For stereo capture or noise reduction purposes, multiple microphones may be provided, each at a different location of terminal 1300. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 1301 or the radio frequency circuitry 1304 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, audio circuitry 1307 may also include a headphone jack.
The positioning component 1308 is used for positioning the current geographic position of the terminal 1300 for implementing navigation or LBS (Location Based Service). The Positioning component 1308 can be a Positioning component based on the GPS (Global Positioning System) of the united states, the beidou System of china, the graves System of russia, or the galileo System of the european union.
Power supply 1309 is used to provide power to various components in terminal 1300. The power source 1309 may be alternating current, direct current, disposable or rechargeable. When the power source 1309 comprises a rechargeable battery, the rechargeable battery may support wired or wireless charging. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, terminal 1300 also includes one or more sensors 1310. The one or more sensors 1310 include, but are not limited to: acceleration sensor 1311, gyro sensor 1312, pressure sensor 1313, fingerprint sensor 1314, optical sensor 1313, and proximity sensor 1316.
The acceleration sensor 1311 can detect the magnitude of acceleration on three coordinate axes of the coordinate system established with the terminal 1300. For example, the acceleration sensor 1311 may be used to detect components of gravitational acceleration in three coordinate axes. The processor 1301 may control the touch display screen 1305 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1311. The acceleration sensor 1311 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 1312 may detect the body direction and the rotation angle of the terminal 1300, and the gyro sensor 1312 may cooperate with the acceleration sensor 1311 to acquire a 3D motion of the user with respect to the terminal 1300. Processor 1301, based on the data collected by gyroscope sensor 1312, may perform the following functions: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensor 1313 may be disposed on a side bezel of terminal 1300 and/or underlying touch display 1305. When the pressure sensor 1313 is disposed on the side frame of the terminal 1300, a user's holding signal to the terminal 1300 may be detected, and the processor 1301 performs left-right hand recognition or shortcut operation according to the holding signal acquired by the pressure sensor 1313. When the pressure sensor 1313 is disposed at a lower layer of the touch display screen 1305, the processor 1301 controls an operability control on the UI interface according to a pressure operation of the user on the touch display screen 1305. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1314 is used for collecting the fingerprint of the user, and the processor 1301 identifies the identity of the user according to the fingerprint collected by the fingerprint sensor 1414, or the fingerprint sensor 1314 identifies the identity of the user according to the collected fingerprint. Upon identifying that the user's identity is a trusted identity, processor 1301 authorizes the user to have relevant sensitive operations, including unlocking the screen, viewing encrypted information, downloading software, paying, and changing settings, etc. The fingerprint sensor 1314 may be disposed on the front, back, or side of the terminal 1300. When a physical key or vendor Logo is provided on the terminal 1300, the fingerprint sensor 1314 may be integrated with the physical key or vendor Logo.
The optical sensor 1315 is used to collect the ambient light intensity. In one embodiment, the processor 1301 can control the display brightness of the touch display screen 1305 according to the intensity of the ambient light collected by the optical sensor 1315. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 1305 is increased; when the ambient light intensity is low, the display brightness of the touch display 1305 is turned down. In another embodiment, the processor 1301 can also dynamically adjust the shooting parameters of the camera assembly 1306 according to the ambient light intensity collected by the optical sensor 1315.
Proximity sensor 1316, also known as a distance sensor, is typically disposed on a front panel of terminal 1300. Proximity sensor 1316 is used to gather the distance between the user and the front face of terminal 1300. In one embodiment, the processor 1301 controls the touch display 1305 to switch from the bright screen state to the dark screen state when the proximity sensor 1316 detects that the distance between the user and the front face of the terminal 1300 gradually decreases; the touch display 1305 is controlled by the processor 1301 to switch from the rest state to the bright state when the proximity sensor 1316 detects that the distance between the user and the front face of the terminal 1300 gradually becomes larger.
Those skilled in the art will appreciate that the configuration shown in fig. 13 is not intended to be limiting with respect to terminal 1300 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be employed.
Fig. 14 is a schematic structural diagram of a server according to an embodiment of the present application, where the server 1400 may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 1401 and one or more memories 1402, where the memory 1402 stores at least one program code, and the at least one program code is loaded and executed by the processors 1401 to implement the methods provided by the foregoing method embodiments. Of course, the server may also have components such as a wired or wireless network interface, a keyboard, and an input/output interface, so as to perform input/output, and the server may also include other components for implementing the functions of the device, which are not described herein again.
The server 1400 may be configured to perform the steps performed by any node device in the blockchain system in the above method for managing security risk information based on blockchain.
The embodiment of the present application further provides a computer device for managing security risk information, where the computer device includes a processor and a memory, where the memory stores at least one program code, and the at least one program code is loaded and executed by the processor, so as to implement the operations in the block chain-based security risk information management method according to the foregoing embodiment.
The embodiment of the present application further provides a computer-readable storage medium, where at least one program code is stored in the computer-readable storage medium, and the at least one program code is loaded and executed by a processor, so as to implement the operations in the block chain-based security risk information management method according to the foregoing embodiments.
The embodiment of the present application further provides a computer program, where the computer program includes at least one program code, and the at least one program code is loaded and executed by a processor to implement the operations in the method for managing security risk information based on a block chain according to the foregoing embodiment.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only an alternative embodiment of the present application and should not be construed as limiting the present application, and any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (13)

1. A safety risk information management method based on a block chain is characterized by comprising the following steps:
responding to security risk information which is sent to a first terminal corresponding to a first user identifier and monitored by first node equipment in a block chain system, and generating prompt information, wherein the prompt information at least comprises the first user identifier;
the first node device generates a first block comprising the prompt message, broadcasts the first block to other node devices in the blockchain system, so that a plurality of node devices in the blockchain system perform consensus verification on the first block, and when the first block passes the consensus of the plurality of node devices in the blockchain system, the first node device records the first block in a blockchain, and the blockchain of each node device keeps synchronous;
the second node equipment in the block chain system extracts the prompt information from the block chain;
and the second node equipment determines a second user identifier bound with the first user identifier, and sends the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information.
2. The method of claim 1, wherein generating the prompt message in response to the first node device in the blockchain system monitoring the security risk information sent to the first terminal corresponding to the first subscriber identity comprises:
the first node equipment collects communication information and carries out safety risk information identification on the communication information, and the user identifier of a receiver of the communication information is the first user identifier;
if the communication information is identified to be safety risk information, matching the first user identification with the monitoring target user identification registered in the block chain;
and generating the prompt message in response to determining that the first user identifier belongs to the monitoring target user identifier.
3. The method of claim 2, wherein the identifying the communication information with security risk information comprises:
acquiring a sender user identifier of the communication information;
and if the safety risk identification library comprises the sender user identification, identifying that the communication information is safety risk information, wherein the safety risk identification library is used for storing the user identification for sending the safety risk information.
4. The method of claim 1, wherein before the generating the prompt message in response to the first node device in the blockchain system monitoring the security risk information sent to the first terminal corresponding to the first subscriber identity, the method further comprises:
the second node equipment receives a monitoring target registration request, wherein the monitoring target registration request carries the first user identification which is requested to be registered as the monitoring target user identification;
and the second node equipment registers the first user identification in the blockchain and broadcasts the first user identification to other node equipment in the blockchain system, and the blockchain of each node equipment keeps synchronous.
5. The method of claim 4, wherein the second node device registering the first subscriber identity in the blockchain comprises:
the second node equipment generates a second block comprising the first user identification;
broadcasting the second block to other node devices in the blockchain system so that a plurality of node devices in the blockchain system perform consensus verification on the second block;
and recording the second block in the block chain after the second block passes through the consensus of a plurality of node devices in the block chain system.
6. The method of claim 4, wherein the second node device registers the first subscriber identity in the blockchain and broadcasts the first subscriber identity to other node devices in the blockchain system, and the blockchain of each node device remains synchronized, comprising:
the second node equipment encrypts the first user identification by adopting a preset encryption algorithm;
and registering the encrypted first user identification in the blockchain, broadcasting the encrypted first user identification to other node equipment in the blockchain system, and keeping the blockchain of each node equipment synchronous.
7. The method of claim 6, wherein generating the prompt message in response to the first node device in the blockchain system monitoring the security risk information sent to the first terminal corresponding to the first subscriber identity comprises:
in response to the first node device monitoring the safety risk information, encrypting the user identification of the receiver of the safety risk information by adopting the preset encryption algorithm;
and if the encrypted user identification of the receiver is the same as the encrypted first user identification, generating the prompt message.
8. The method of claim 4, wherein the monitoring target registration request further carries a second subscriber identity requesting to be bound to the first subscriber identity, and wherein registering the first subscriber identity in the blockchain comprises:
the second node equipment sends the monitoring target registration request to a first terminal corresponding to the first user identification;
and registering the first user identification in the block chain in response to receiving a registration confirmation message sent by the first terminal.
9. An apparatus for block chain-based security risk information management, the apparatus comprising:
the system comprises a prompt information generation module, a block chain processing module and a block chain processing module, wherein the prompt information generation module is used for responding to security risk information which is monitored by first node equipment in a block chain system and is sent to a first terminal corresponding to a first user identifier, and the prompt information at least comprises the first user identifier;
a hint information recording module, configured to generate, by the first node device, a first block including the hint information, and broadcast the first block to other node devices in the blockchain system, so that the plurality of node devices in the blockchain system perform consensus verification on the first block, and after the first block passes the consensus of the plurality of node devices in the blockchain system, the first node device records the first block in a blockchain, where a blockchain of each node device is kept synchronous;
the prompt information extraction module is used for extracting the prompt information from the block chain by second node equipment in the block chain system;
and the prompt information sending module is used for the second node equipment to determine a second user identifier bound with the first user identifier, and send the prompt information to a second terminal corresponding to the second user identifier so that the second terminal outputs the prompt information.
10. The apparatus of claim 9, wherein the hint information generation module comprises:
the information identification unit is used for acquiring communication information by the first node equipment and identifying safety risk information of the communication information, wherein a receiver user identifier of the communication information is the first user identifier;
the information processing unit is used for matching the first user identifier with the monitoring target user identifier registered in the block chain if the communication information is identified as safety risk information;
and the first generating unit is used for responding to the fact that the first user identification belongs to the monitoring target user identification, and generating the prompt information.
11. The apparatus of claim 10, wherein the information identifying unit is further configured to: acquiring a sender user identifier of the communication information;
and if the safety risk identification library comprises the sender user identification, identifying that the communication information is safety risk information, wherein the safety risk identification library is used for storing the user identification for sending the safety risk information.
12. A computer device comprising a processor and a memory, the memory having stored therein at least one program code, the at least one program code being loaded and executed by the processor to implement the method for blockchain based security risk information management according to any of claims 1 to 8.
13. A computer-readable storage medium having at least one program code stored therein, the at least one program code being loaded and executed by a processor to implement the blockchain based security risk information management method according to any one of claims 1 to 8.
CN202010097811.3A 2020-02-17 2020-02-17 Block chain-based security risk information management method, device, equipment and storage medium Active CN111277608B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010097811.3A CN111277608B (en) 2020-02-17 2020-02-17 Block chain-based security risk information management method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010097811.3A CN111277608B (en) 2020-02-17 2020-02-17 Block chain-based security risk information management method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111277608A CN111277608A (en) 2020-06-12
CN111277608B true CN111277608B (en) 2021-06-11

Family

ID=71000237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010097811.3A Active CN111277608B (en) 2020-02-17 2020-02-17 Block chain-based security risk information management method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111277608B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112632639B (en) * 2020-12-29 2024-04-12 航天科工网络信息发展有限公司 Distributed trusted log management method based on blockchain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171834A (en) * 2017-05-05 2017-09-15 四川长虹电器股份有限公司 Short Message Service Gateway service platform monitoring early-warning system and method based on gateway early warning pond
CN107734469A (en) * 2017-09-18 2018-02-23 咪咕动漫有限公司 A kind of fraudulent call based reminding method, device and computer-readable recording medium
EP3447705A1 (en) * 2017-08-22 2019-02-27 Sap Se Transaction platform providing unified interaction with multiple heterogeneous blockchains
CN110060060A (en) * 2019-03-01 2019-07-26 阿里巴巴集团控股有限公司 Method of controlling security, device, electronic equipment and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171834A (en) * 2017-05-05 2017-09-15 四川长虹电器股份有限公司 Short Message Service Gateway service platform monitoring early-warning system and method based on gateway early warning pond
EP3447705A1 (en) * 2017-08-22 2019-02-27 Sap Se Transaction platform providing unified interaction with multiple heterogeneous blockchains
CN107734469A (en) * 2017-09-18 2018-02-23 咪咕动漫有限公司 A kind of fraudulent call based reminding method, device and computer-readable recording medium
CN110060060A (en) * 2019-03-01 2019-07-26 阿里巴巴集团控股有限公司 Method of controlling security, device, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN111277608A (en) 2020-06-12

Similar Documents

Publication Publication Date Title
CN110602089B (en) Block chain-based medical data storage method, device, equipment and storage medium
CN111245745B (en) Message sending method, device, node equipment and storage medium
CN110245144B (en) Protocol data management method, device, storage medium and system
CN110401715B (en) Resource collection task management method, device, storage medium and system
CN110597924B (en) Block chain-based user identification processing method, device, equipment and storage medium
CN110598482A (en) Block chain-based digital certificate management method, device, equipment and storage medium
CN111045568B (en) Virtual article processing method, device, equipment and storage medium based on block chain
CN111355732B (en) Link detection method and device, electronic equipment and storage medium
CN111506884A (en) User invitation method, device, computer equipment and computer readable storage medium
CN110826103B (en) Method, device, equipment and storage medium for processing document authority based on blockchain
CN110598386B (en) Block chain-based data processing method, device, equipment and storage medium
CN110581891A (en) Game data processing method, device, equipment and storage medium based on block chain
CN111667371B (en) Resource aggregation method, system, device and storage medium based on block chain
CN112073421A (en) Communication processing method, communication processing device, terminal and storage medium
CN111414598A (en) Monitoring method, device and equipment based on block chain and storage medium
CN110365501B (en) Method and device for group joining processing based on graphic code
CN111212074A (en) Qualification determination method, device, equipment and storage medium based on block chain
CN111131392A (en) Method, device, electronic equipment and medium for processing message
CN111970298B (en) Application access method and device, storage medium and computer equipment
CN111277608B (en) Block chain-based security risk information management method, device, equipment and storage medium
CN110889264B (en) Multimedia information processing method, device, equipment and storage medium
CN110727894A (en) Target material setting method, device, equipment and storage medium
CN111694892B (en) Resource transfer method, device, terminal, server and storage medium
CN110597840A (en) Partner relationship establishing method, device, equipment and storage medium based on block chain
CN110597868A (en) Information query method, device, terminal and storage medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024316

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant